Rule-based dependency models for security protocol analysis
Integrated Computer-Aided Engineering
Secure transaction protocol analysis: models and applications
Secure transaction protocol analysis: models and applications
Hi-index | 0.00 |
Fingerprinting schemes allow tracing of illegally redistributedmultimedia contents. When using asymmetricfingerprinting, the merchant does not know themarked copy nor the embedded mark, so fraudulent distributionof the content by the merchant -which couldlead to framing honest customers- is not possible. Aproblem with the deployment of classical asymmetricfingerprinting protocols is that they are based on informationtransfer methods whose implementation isdifficult, if not infeasible.In this paper, we propose an architecture to obtainasymmetric fingerprinting through symmetric (andthus implementable) schemes and a trusted third party(TTP).